AI-IA Nexus: The Future of Information Systems Security, Privacy, and Quality

Editors

  • Rui Chen, Iowa State University
  • Juan Feng, Tsinghua University
  • Miguel Godinho de Matos, Católica Lisbon School of Business & Economics
  • Carol Hsu, University of Sydney
  • H. Raghav Rao, University of Texas at San Antonio

Description

Digital threats continue to impede information assurance. Many issues in information assurance have arisen in the last decade or two, including risk management, information quality, intellectual property, privacy protection, compliance with regulations, and continuity of operations. As a result, protecting information has become a global priority, and collaborative efforts are being made to prevent, detect, and react to threats to information quality, authenticity, integrity, confidentiality, and availability.

As society steps into the age of generative AI (GenAI), fresh challenges and opportunities are arising in the realms of information security, privacy, and quality. Questions have emerged regarding the role and intended/unintended consequences of GenAI in information assurance. GenAI is believed to pose a paradox, serving as a dual-edged sword in the realm of information assurance.

The emergence of GenAI is poised to exert a profound impact on assurance. On the one hand, GenAI has been recognized for its ability to bolster information assurance. On the other hand, GenAI heightens the potency of existing threats, allows the fabrication of false information, fuels intellectual property theft, and poses challenges to governance and compliance. Tremendous new opportunities exist for information systems scholars to study information assurance issues within the context of GenAI, as traditional approaches may not work.

This special issue seeks research that goes beyond simple applications of existing theories and methods from the cybersecurity literature in IS. We invite studies that explore the unique information assurance challenges in the realm of GenAI, calling for the development and application of new theories or methods.

Potential topics

  • Sophisticated human-deception attacks
  • Hallucination and confabulation
  • Intellectual property theft
  • Challenges in regulation and compliance
  • Unreliable training data
  • Data poisoning
  • Security leaks, inference attacks, and knowledge phishing
  • Prompt injections

Associate editors

Panagiotis Adamopoulos, Emory University
Jingjing Li, University of Virginia
Rodrigo Belo, Nova School of Business and Economics
Huigang Liang, University of Memphis
Indranil Bose, NEOMA
Alexander Maedche, Karlsruhe Institute of Technology
Lemuria Carter, University of Sydney
Ning Nan, University of British Columbia
Christy Cheung, Hong Kong Baptist University
Jella Pfeiffer, University of Stuttgart
Rahul De', Indian Institute of Management Bangalore
Dandan Qiao, National University of Singapore
Amany Elbanna, University of Sussex
Sagar Samtani, Indiana University
Uri Gal, University of Sydney
Anastasia Sergeeva, Vrije Universiteit Amsterdam
Weiyin Hong, Hong Kong University of Science and Technology
Maha Shaikh, ESADE Business School
Nina Huang, University of Miami
Paolo Spagnoletti, Luiss Business School
Hartmut Höhle, University of Mannheim
Rohit Valecha, University of Texas at San Antonio
Allen Johnston, University of Alabama
Jing Wang, Hong Kong University of Science and Technology
Arpan Kar, Indian Institute of Technology
Jingguo Wang, University of Texas at Arlington
Juhee Kwon, City University of Hong Kong
Hong Xu, Hong Kong University of Science and Technology
Atanu Lahiri,